SELAMAT DATANG DI TEMPATKU.

Semoga anda puas dan betah di tempatku. Walau pun semua serba sederhana serta ke kurangan. Maklum aja, aku baru belajar...! Karena itu aku sangat mengharapkan sekali Petunjuk serta Bimbingan dari anda yang datang ke tempat ini. Demi kemajuah dan perbaikan Blog yang masih sembraut tak karuan. dan serba asal - asalan.

Wasalamm...!

Goddi (Go Dump Domain Info) - Dumps Active Directory Domain Information



Based on work from Scott Sutherland (@_nullbind), Antti Rantasaari, Eric Gruber (@egru), Will Schroeder (@harmj0y), and the PowerView authors.

Install
Use the executables in the releases section. If you want to build it yourself, make sure that your go environment is setup according to the Go setup doc. The goddi package also uses the below package.
go get gopkg.in/ldap.v2

Windows
Tested on Windows 10 and 8.1 (go1.10 windows/amd64).

Linux
Tested on Kali Linux (go1.10 linux/amd64).
  • umount, mount, and cifs-utils need to be installed for mapping a share for GetGPP
apt-get update
apt-get install -y mount cifs-utils
  • make sure nothing is mounted at /mnt/goddi/
  • make sure to run with sudo

Run
When run, will default to using TLS (tls.Client method) over 636. On Linux, make sure to run with sudo.
  • username: Target user. Required parameter.
  • password: Target user's password. Required parameter.
  • domain: Full domain name. Required parameter.
  • dc: DC to target. Can be either an IP or full hostname. Required parameter.
  • startTLS: Use to StartTLS over 389.
  • unsafe: Use for a plaintext connection.
PS C:\Users\Administrator\Desktop> .\godditest-windows-amd64.exe -username=testuser -password="testpass!" -domain="test.local" -dc="dc.test.local" -unsafe
[i] Begin PLAINTEXT LDAP connection to 'dc.test.local'...
[i] PLAINTEXT LDAP connection to 'dc.test.local' successful...
[i] Begin BIND...
[i] BIND with 'testuser' successful...
[i] Begin dump domain info...
[i] Domain Trusts: 1 found
[i] Domain Controllers: 1 found
[i] Users: 12 found
[*] Warning: keyword 'pass' found!
[*] Warning: keyword 'fall' found!
[i] Domain Admins: 4 users found
[i] Enterprise Admins: 1 users found
[i] Forest Admins: 0 users found
[i] Locked Users: 0 found
[i] Disabled Users: 2 found
[i] Groups: 45 found
[i] Domain Sites: 1 found
[i] Domain Subnets: 0 found
[i] Domain Computers: 17 found
[i] Deligated Users: 0 found
[i] Users with passwords not set to expire: 6 found
[i] Machine Accounts with passwords older than 45 days: 18 found
[i] Domain OUs: 8 found
[i] Domain Account Policy found
[i] Domain GPOs: 7 found
[i] FSMO Roles: 3 found
[i] SPNs: 122 found
[i] LAPS passwords: 0 found
[i] GPP enumeration starting. This can take a bit...
[i] GPP passwords: 7 found
[i] CSVs written to 'csv' directory in C:\Users\Administrator\Desktop
[i] Execution took 1.4217256s...
[i] Exiting...

Functionality
StartTLS and TLS (tls.Client func) connections supported. Connections over TLS are default. All output goes to CSVs and are created in /csv/ in the current working directory. Dumps:
  • Domain users. Also searches Description for keywords and prints to a seperate csv ex. "Password" was found in the domain user description.
  • Users in priveleged user groups (DA, EA, FA).
  • Users with passwords not set to expire.
  • User accounts that have been locked or disabled.
  • Machine accounts with passwords older than 45 days.
  • Domain Computers.
  • Domain Controllers.
  • Sites and Subnets.
  • SPNs and includes csv flag if domain admin (a flag to note SPNs that are DAs in the SPN CSV output).
  • Trusted domain relationships.
  • Domain Groups.
  • Domain OUs.
  • Domain Account Policy.
  • Domain deligation users.
  • Domain GPOs.
  • Domain FSMO roles.
  • LAPS passwords.
  • GPP passwords. On Windows, defaults to mapping Q. If used, will try another mapping until success R, S, etc... On Linux, /mnt/goddi is used.


Related word


  1. New Hacker Tools
  2. Pentest Tools Android
  3. New Hack Tools
  4. Hacking Tools For Mac
  5. Hacker Tools For Ios
  6. Pentest Tools For Android
  7. Hacker Tools
  8. What Are Hacking Tools
  9. Hacker Tool Kit
  10. Pentest Tools Find Subdomains
  11. Pentest Tools Alternative
  12. Pentest Tools Github
  13. Hack Tool Apk No Root
  14. Hacking Tools For Kali Linux
  15. Pentest Tools Framework
  16. Pentest Automation Tools
  17. Hacker Tools Free Download
  18. Hacker Tools Free
  19. Hackers Toolbox
  20. Hacking Tools Hardware
  21. Hack And Tools
  22. Pentest Tools Framework
  23. New Hack Tools
  24. Hacking Tools Windows
  25. Hacking Tools For Beginners
  26. Pentest Automation Tools
  27. Hack Website Online Tool
  28. Pentest Tools Port Scanner
  29. Pentest Recon Tools
  30. Hack Tools
  31. Pentest Tools Nmap
  32. Hak5 Tools
  33. Hacker Tools For Pc
  34. Hack Tools 2019
  35. Hacking Tools 2019
  36. Pentest Box Tools Download
  37. Pentest Automation Tools
  38. Hacking Tools Windows
  39. Hacker Tools For Pc
  40. Hack Tools Online
  41. Hack Tool Apk
  42. Nsa Hack Tools
  43. Hacker Security Tools
  44. Hack Tools For Windows
  45. Hack Tool Apk
  46. Best Hacking Tools 2020
  47. Hack Tools For Mac
  48. Hacker Tools Linux
  49. Hack Tools 2019
  50. Hacking Tools For Windows Free Download
  51. How To Hack
  52. Hacking Tools Free Download
  53. Hacker Tools Mac
  54. Pentest Tools For Mac
  55. Hacker Tools Online
  56. Pentest Tools Url Fuzzer
  57. Pentest Tools Nmap
  58. Hacking Apps
  59. Pentest Tools Windows
  60. Hacker Tools For Pc
  61. Hacker Tools
  62. Termux Hacking Tools 2019
  63. Hack Tools Online
  64. Hacker Tools Github
  65. Tools 4 Hack
  66. Termux Hacking Tools 2019
  67. Hacking Tools Software
  68. Hack Tool Apk No Root
  69. Hacker Tools 2020
  70. Beginner Hacker Tools
  71. Hacking Tools Name
  72. Tools Used For Hacking
  73. Pentest Tools Review
  74. Wifi Hacker Tools For Windows

Tidak ada komentar:

Posting Komentar